This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strategy and requires integration between elements.
• Identify assets and their owners • Identify threats • Identify vulnerabilities that threats could exploit • Identify the probabilities and impacts of risks<... more...
is a summary of the measures taken by a legal entity or a natural person who is an entrepreneur under a special law for the protection of classified facts that have been ... more...
Nariadenie Európskeho parlamentu a Rady (EÚ) 2025/38 z 19. decembra 2024, ktorým sa stanovujú opatrenia na posilnenie solidarity a kapacít v Únii na odhaľovanie kyberneti... more...show link